shithub: fuzz

Download patch

ref: 4f5742d10480c958c16b36686810c9b9130db9e0
parent: 8dc78bb71b7970c5fcc466a6138e0eb3dbc0796d
author: Anthony House <tuffant21@aim.com>
date: Sat Nov 24 10:08:48 EST 2018

trying to find the bug

--- a/mutate.c
+++ b/mutate.c
@@ -22,10 +22,10 @@
 //    }
 //    else
 //    {
-dolog("mut_int \'before\' round %d, value: %d", *round, *in_val);
+dolog("mut_int \'before\' round %d, value: %d\n", *round, *in_val);
         (*in_val) << (rand() % (4 + 1 - 0) + 0);
         (*in_val) |= (rand() % (15 + 1 - 0) + 0);
-dolog("mut_int \'after\' round %d, value: %d", *round, *in_val);
+dolog("mut_int \'after\' round %d, value: %d\n", *round, *in_val);
 //    }
 }
 
@@ -91,10 +91,10 @@
 //    }
 //    else
 //    {
-dolog("mut_int \'before\' round %d, value: %d", *round, *in_val);
+dolog("mut_int \'before\' round %d, value: %d\n", *round, *in_val);
         (*in_val) << (rand() % (4 + 1 - 0) + 0);
         (*in_val) |= (rand() % (15 + 1 - 0) + 0);
-dolog("mut_int \'after\' round %d, value: %d", *round, *in_val);
+dolog("mut_int \'after\' round %d, value: %d\n", *round, *in_val);
 //    }
 }